Skip to content

Commit b1805b6

Browse files
authored
Merge pull request #219444 from batamig/recommendations
recommendations
2 parents 61b19ec + 482894f commit b1805b6

File tree

6 files changed

+82
-1
lines changed

6 files changed

+82
-1
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,9 @@
123123
href: how-to-gain-insight-into-global-regional-and-local-threats.md
124124
- name: Analyze OT programming details and changes
125125
href: how-to-analyze-programming-details-changes.md
126+
- name: Enhance security posture
127+
href: recommendations.md
128+
displayName: recommendations
126129
- name: Integrate with security partners
127130
items:
128131
- name: Integration catalog
233 KB
Loading
387 KB
Loading
1.42 KB
Loading
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: Enhance security posture with security recommendations - Microsoft Defender for IoT
3+
description: Learn about how to find security recommendations for devices detected by Microsoft Defender for IoT.
4+
ms.date: 11/23/2022
5+
ms.topic: how-to
6+
---
7+
8+
# Enhance security posture with security recommendations
9+
10+
Use Microsoft Defender for IoT's security recommendations to enhance your network security posture across unhealthy devices in your network. Lower your attack surface by creating actionable, prioritized mitigation plans that address the unique challenges in OT/IoT networks.
11+
12+
## View security recommendations
13+
14+
View all current recommendations for your organization on the Defender for IoT **Recommendations** page on the Azure portal. For example:
15+
16+
:::image type="content" source="media/recommendations/recommendations.png" alt-text="Screenshot of the Recommendations page on the Azure portal." lightbox="media/recommendations/recommendations.png":::
17+
18+
The **Active recommendations** widget indicates the number of recommendations that represent actionable steps you can currently take on unhealthy devices. We recommend reviewing unhealthy devices regularly, taking recommended actions, and keeping the number of active recommendations as low as possible.
19+
20+
Recommendations are shown in a grid with details in the following columns:
21+
22+
|Column name |Description |
23+
|---------|---------|
24+
|**Severity** | Indicates the urgency of the suggested mitigation step. |
25+
|**Name** | The recommendation's name, which indicates a summary of the suggested mitigation step. |
26+
|**Unhealthy devices** | The number of detected devices where the recommended step is relevant. |
27+
|**Healthy devices** | The number of detected devices where the recommended step is covered and no action is required. |
28+
|**Last update time** | The last time the recommendation was triggered on a detected device. |
29+
30+
Do either of the following to modify the recommendation data listed:
31+
32+
- Select :::image type="icon" source="media/how-to-manage-device-inventory-on-the-cloud/edit-columns-icon.png" border="false"::: **Edit columns** to add or remove columns from the grid.
33+
- Filter the list by entering a keyword from the recommendation name in the **Search** box, or select **Add filter** to filter the grid by any of the recommendation columns.
34+
35+
To export a CSV file of all recommendations for your network, select :::image type="icon" source="media/how-to-manage-device-inventory-on-the-cloud/export-button.png" border="false" :::**Export**.
36+
37+
## View recommendation details
38+
39+
Select a specific recommendation in the grid to drill down for more details. The recommendation name is shown as the page's title, with details with the recommendation's severity, number of unhealthy devices detected, and last update date and time in widgets on the left.
40+
41+
The left pane also shows the following information:
42+
43+
- **Description**: More context for the recommended mitigation step
44+
- **Remediation steps**: The full list of mitigation steps recommended for unhealthy devices
45+
46+
Switch between the **Unhealthy devices** and **Healthy devices** tabs to review the statuses of detected devices in your network for the selected recommendation.
47+
48+
For example:
49+
50+
:::image type="content" source="media/release-notes/recommendations.png" alt-text="Screenshot of the Review PLC operating mode recommendation page." lightbox="media/release-notes/recommendations.png":::
51+
52+
### View recommendation details by device
53+
54+
You might want to review all recommendations for a specific device in order to handle them all together.
55+
56+
Recommendations are also listed on the **Device details** page for each detected device, accessed either from the [**Device inventory** page](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory), or from the list of healthy or unhealthy devices on a recommendation details page.
57+
58+
On a device details page, select the **Recommendations** tab to view a list of security recommendations specific for the selected device.
59+
60+
For example:
61+
62+
:::image type="content" source="media/recommendations/recommendations-device-details.png" alt-text="Screenshot of the Recommendations tab on a device details page." lightbox="media/recommendations/recommendations-device-details.png":::
63+
64+
## Supported OT network recommendations
65+
66+
The following recommendations are displayed for detected OT devices:
67+
68+
- **Review PLC operating mode**. Devices with this recommendation are found with PLCs set to unsecure operating mode states. We recommend setting PLC operating modes to the **Secure Run** state if access is no longer required to the PLC to reduce the threat of malicious PLC programming.
69+
70+
- **Review unauthorized devices**. Devices with this recommendation must be identified and authorized as part of the network baseline. We recommend taking action to identify any indicated devices. Disconnect any devices from your network that remain unknown even after investigation to reduce the threat of rogue or potentially malicious devices.
71+
72+
Other recommendations are listed for the [Defender for IoT micro agent](/azure/defender-for-iot/device-builders/).
73+
74+
## Next steps
75+
76+
> [!div class="nextstepaction"]
77+
> [View the device inventory](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory)
78+

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ From either location, select a recommendation to drill down further and view lis
7575

7676
:::image type="content" source="media/release-notes/recommendations.png" alt-text="Screenshot of the Review PLC operating mode recommendation page.":::
7777

78-
For more information, see [View the device inventory](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory).
78+
For more information, see [View the device inventory](how-to-manage-device-inventory-for-organizations.md#view-the-device-inventory) and [Enhance security posture with security recommendations](recommendations.md).
7979

8080
### Device vulnerabilities from the Azure portal (Public preview)
8181

0 commit comments

Comments
 (0)